CN110830260B - Block chain-based digital signature timestamp generation method - Google Patents

Block chain-based digital signature timestamp generation method Download PDF

Info

Publication number
CN110830260B
CN110830260B CN201910929365.5A CN201910929365A CN110830260B CN 110830260 B CN110830260 B CN 110830260B CN 201910929365 A CN201910929365 A CN 201910929365A CN 110830260 B CN110830260 B CN 110830260B
Authority
CN
China
Prior art keywords
signature
block chain
block
hash value
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910929365.5A
Other languages
Chinese (zh)
Other versions
CN110830260A (en
Inventor
许春香
李闯
张源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201910929365.5A priority Critical patent/CN110830260B/en
Publication of CN110830260A publication Critical patent/CN110830260A/en
Priority to US17/032,041 priority patent/US11936799B2/en
Application granted granted Critical
Publication of CN110830260B publication Critical patent/CN110830260B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention discloses a timestamp generation method of a digital signature based on a block chain, which mainly comprises three stages: the method comprises a system parameter establishing stage, a signature stage and a verification stage. In the signing stage, a signer obtains hash values of n newly confirmed blocks in a block chain, binds the n hash values and a message M to be signed together to be recorded as M ', signs the M ' to obtain a signature T, calculates a hash value h of M ' | | T, and uploads the h to the block chain through a transaction Tx. After the verifier finishes the verification of the signature T, the time range before the generation time of the block where the transaction Tx is located after the generation time of the block where the nth hash value is located is taken as the time stamp of the signature T, and the method is an accurate method for de-centralizing the time stamp of the digital signature.

Description

Block chain-based digital signature timestamp generation method
Technical Field
The invention belongs to the data protection technology, and particularly relates to a method for stamping a digital signature.
Background
The time stamp is proof that the digital file is created at a certain time, and is an indispensable tool for protecting the evidence value of the digital information. In 1990, Stuart Haber et al proposed a scheme for timestamping a digital file on CRYPTO 90, which enables the non-forgeability of the timestamp by a trust center signing the hash value and the current time of the digital file. A large number of improvement schemes are provided in follow-up work, but the existing schemes all depend on a trusted third party and cannot solve the problem of single-point failure.
Disclosure of Invention
The invention aims to solve the technical problem of providing a method for realizing the time stamping of the digital signature based on the block chain technology.
The technical scheme adopted by the invention for solving the technical problems is that the timestamp generation method of the digital signature based on the block chain mainly comprises three stages: the method comprises a system parameter establishing stage, a signature stage and a verification stage.
A system parameter establishing stage: generating blocks by a block chain and recording the generation time of each block, wherein the system generates a safe hash function, a signature algorithm and a corresponding verification algorithm;
and (3) signature stage: a signer obtains hash values of n newly confirmed blocks in a block chain, binds the n hash values and a message M to be signed together to be marked as M ', signs the M ' to obtain a signature T, calculates a hash value h of M ' | | T, and uploads the h to the block chain through a transaction Tx;
a verification stage: and after the verification of the signature T is passed, the verifier takes the time range before the generation time of the block where the transaction Tx is located after the generation time of the block where the nth hash value is located as the time stamp of the signature T.
The block chain is a decentralized distributed account, blocks on the chain are connected through hash values, the time sequence of the blocks is guaranteed, and each block of the block chain comprises the generation time of the block.
The method has the advantages that the problem of single point failure is solved based on the block chain technology, and the method is a decentralized accurate method for stamping the time stamp for the digital signature.
Detailed Description
The Blockchain is a public block chain, and as for a digital signature generated by any user in the system, any other user in the system can verify the digital signature through the Blockchain and generate an accurate and consistent timestamp. The following description will take the signer a and the verifier B as an example.
Firstly, a system parameter establishing stage:
if n blocks are linked after a block in Blockchain, it can be confirmed that the block is on Blockchain. The system generates a safe Hash function H (), a signature algorithm SigA(.) and corresponding verification algorithm VerA(.), subscript a indicates signer a. T ═ SigAAnd (M) indicates that the signer A signs the message M to obtain a signature T. VerAAnd (M, T) represents that the verifier verifies the validity of the signature T of the signer A on the message M, if the signature T is valid, true is returned, and if the signature T is invalid, false is returned. And | represents a connection symbol. The signature algorithm Sig may be any signature algorithm.
II, signature stage:
when the signer A needs to sign the message M, the following operations are executed:
1. obtaining hash values h of n blocks which are newly confirmed on the current Blockchain1,h2,...,hn(arranged by block height from low to high); preferably, n is more than or equal to 12 in the Ether house, and n is more than or equal to 6 in the bitcoin;
2. the way to bind these n hash values with the message M to be signed is: calculating a hash value hBlock=H(h1||h2||...||hn) Then M hBlockIs marked as M';
3. signing M' with T ═ SigA(M||hBlock) Obtaining a signature T;
4. calculating a hash value hA=H(M||h1||h2||...||hn||T);
5. Generating a pen containing hAAnd sending the transaction to Blockchain, and ensuring that Blockchain records the transaction (transaction Tx is recorded at position L in Blockchain);
6. the signer A records the position L of the transaction on Blockchain, and sends a message M and a hash value h1,h2,...,hnThe signature T and the location L are sent to the verifier B.
Thirdly, a verification stage:
the verifier B receives the message M and the hash value h1,h2,...,hnAfter signing T and location L, the signature needs to be verified and the timestamp of the digital signature confirmed. Verifier B performs the following operations:
1. verifying a hash value h1,h2,...,hnWhether the hash value is the hash value of n continuous blocks on Blockchain, and if not, exiting; if yes, continuing to execute the next step;
2. finding the transaction of the signer A in Blockchain by using the position information L, and acquiring a hash value hAVerifier B verifies equation hA=H(M||h1||h2||...||hnIf | T) holds. If the equality is not satisfied, exiting; if the equation is established, continuing to execute the next step;
3. calculating a hash value hBlock=H(h1||h2||...||hn);
4. Executing a validation Algorithm VerA((M||hBlock) T), if false is returned, the signature is invalid and quit; if true is returned, the signature is valid, and the verifierB, acquiring the generation time t of the block where the transaction Tx is located, and recording that the hash value on Blockchain is hnThe block of (1) is generated for time t'; verifier B confirms that signature T was generated before T and after T ', the time interval T', T]As a timestamp of the digital signature T.

Claims (3)

1. A timestamp generation method based on digital signature of a block chain is characterized by comprising the following steps:
1) a system parameter establishing stage:
generating blocks by a block chain and recording the generation time of each block, wherein the system generates a secure hash function H (), a signature algorithm Sig (), and a corresponding verification algorithm Ver ();
2) and (3) signature stage:
2-1) signer obtains hash values h of recently generated n continuous blocks in a block chain1,h2,...,hnThen calculate the hash value hBlock=H(h1||h2||...||hn) Using signature algorithm to pair message M and hash value hBlockSignature processing is performed to obtain a signature T ═ Sig (M | | h)Block) Then, the hash value H is calculated as H (M | | H)1||h2||...||hnI T), and finally generating a block chain transaction Tx containing the hash value h and sending the block chain transaction Tx to the block chain;
2-2) the blockchain records a transaction Tx, wherein the transaction Tx is recorded at a position L in the blockchain;
2-3) the signer records the position L in the block chain where the transaction Tx is located, and sends the message M and the hash value h1,h2,...,hnThe signature T and the position L are sent to a verifier;
3) in the verification stage, a verifier receives the message M and the hash value h1,h2,..,hnAfter signing T and location L, the signature is verified and a timestamp of the digital signature is generated:
3-1) verifier verifies hash value h1,h2,...,hnWhether the hash value is the hash value of n continuous blocks on the block chain, and if not, exiting; if yes, continuing to execute the next step;
3-2) finding the signer's transaction Tx in the blockchain according to the location L and obtaining the hash value H, the verifier verifying the equation H ═ H (M | | H)1||h2||...||hnIf the equation is not established, quitting; if the equation is established, continuing to execute the next step;
3-3) calculating the Hash value hBlock=H(h1||h2||...||hn) Then, the verification algorithm Ver ((M | | h) of the signature is executedBlock) T), if the verification fails, the signature is invalid and quit; if the verification is passed, the signature is valid, and the verifier acquires the generation time t of the block recording the transaction Tx and the hash value h on the block chainnThe generation time T 'of the block of (a), the time stamp of the verifier confirmation signature T is [ T', T [ ]]。
2. The method of claim 1, wherein if the block chain is an Etherhouse block chain, n ≧ 12 is set.
3. The method of claim 1, wherein if the block chain is a bitcoin block chain, n ≧ 6 is set.
CN201910929365.5A 2019-09-27 2019-09-27 Block chain-based digital signature timestamp generation method Active CN110830260B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910929365.5A CN110830260B (en) 2019-09-27 2019-09-27 Block chain-based digital signature timestamp generation method
US17/032,041 US11936799B2 (en) 2019-09-27 2020-09-25 Blockchain-based time stamping method for digital signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910929365.5A CN110830260B (en) 2019-09-27 2019-09-27 Block chain-based digital signature timestamp generation method

Publications (2)

Publication Number Publication Date
CN110830260A CN110830260A (en) 2020-02-21
CN110830260B true CN110830260B (en) 2021-09-24

Family

ID=69548370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910929365.5A Active CN110830260B (en) 2019-09-27 2019-09-27 Block chain-based digital signature timestamp generation method

Country Status (2)

Country Link
US (1) US11936799B2 (en)
CN (1) CN110830260B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3989479B1 (en) * 2020-10-23 2023-07-19 Nokia Technologies Oy Methods and devices in a blockchain network
CN114598494B (en) * 2022-01-18 2023-02-28 电子科技大学 Data timing transmission method based on block chain
CN114726536A (en) * 2022-03-31 2022-07-08 南方电网科学研究院有限责任公司 Timestamp generation method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566398A (en) * 2018-04-23 2018-09-21 北京奇虎科技有限公司 Block chain attack cognitive method based on timestamp and device
CN109034805A (en) * 2018-08-09 2018-12-18 江苏先安科技有限公司 It is a kind of to stab signature verification method suitable for the new time of block chain and built-in field
CN109508984A (en) * 2018-11-26 2019-03-22 中国科学院软件研究所 It is a kind of that card method is deposited based on certainty common recognition and the block chain electronics of trusted timestamp
CN110061843A (en) * 2019-01-31 2019-07-26 阿里巴巴集团控股有限公司 The high creation method of block, device and equipment in a kind of chain type account book
US20190278921A1 (en) * 2013-07-06 2019-09-12 NewVoiceMedia Ltd. System and methods for tamper proof interaction recording and timestamping

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004260664A (en) * 2003-02-27 2004-09-16 Nec Corp Xml signature generation system with time stamp imparting function, device, method, and program
US10402792B2 (en) * 2015-08-13 2019-09-03 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
US11212081B2 (en) * 2017-02-24 2021-12-28 Nec Corporation Method for signing a new block in a decentralized blockchain consensus network
CN110430064B (en) * 2017-03-30 2020-12-04 腾讯科技(深圳)有限公司 Block chain system, message processing method and storage medium
US20180293557A1 (en) * 2017-04-05 2018-10-11 Samsung Sds Co., Ltd. Method of charging electronic currency automatically based on blockchain and system thereof
US11102244B1 (en) * 2017-06-07 2021-08-24 Agari Data, Inc. Automated intelligence gathering
CN111466096B (en) * 2017-09-08 2021-12-31 尤利杰公司 System and method for providing immutable records
US11728995B2 (en) * 2018-04-09 2023-08-15 American Express Travel Related Services Company, Inc. Reward point transfers using blockchain
US11080691B2 (en) * 2018-04-09 2021-08-03 Storecoin Inc. Fork-tolerant consensus protocol
US20210097532A1 (en) * 2018-04-19 2021-04-01 Sak Mahasuverachai Systems and methods for recording assets and transactions thereof in blockchains
EP3605944B1 (en) * 2018-07-31 2023-08-30 Siemens Healthcare GmbH Documenting timestamps within a blockchain
JP2020021186A (en) * 2018-07-31 2020-02-06 富士通株式会社 Transaction control device, transaction control program, and transaction control method
US20200117733A1 (en) * 2018-10-11 2020-04-16 Sap Se Blockchain integration layer
US10929816B2 (en) * 2018-10-29 2021-02-23 Advanced Messaging Technologies, Inc. Systems and methods for message transmission and retrieval using blockchain
CN109784005A (en) * 2018-12-28 2019-05-21 国网雄安金融科技有限公司 Electronic protocol manages platform and electronic protocol management method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190278921A1 (en) * 2013-07-06 2019-09-12 NewVoiceMedia Ltd. System and methods for tamper proof interaction recording and timestamping
CN108566398A (en) * 2018-04-23 2018-09-21 北京奇虎科技有限公司 Block chain attack cognitive method based on timestamp and device
CN109034805A (en) * 2018-08-09 2018-12-18 江苏先安科技有限公司 It is a kind of to stab signature verification method suitable for the new time of block chain and built-in field
CN109508984A (en) * 2018-11-26 2019-03-22 中国科学院软件研究所 It is a kind of that card method is deposited based on certainty common recognition and the block chain electronics of trusted timestamp
CN110061843A (en) * 2019-01-31 2019-07-26 阿里巴巴集团控股有限公司 The high creation method of block, device and equipment in a kind of chain type account book

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《基于区块链的投票系统的设计与开发》;胡浩;《中国优秀硕士学位论文全文数据库》;20190115;全文 *

Also Published As

Publication number Publication date
US20210099315A1 (en) 2021-04-01
US11936799B2 (en) 2024-03-19
CN110830260A (en) 2020-02-21

Similar Documents

Publication Publication Date Title
CN110830260B (en) Block chain-based digital signature timestamp generation method
CN108667626B (en) Secure two-party collaboration SM2 signature method
US8971528B2 (en) Modified elliptic curve signature algorithm for message recovery
US8533482B2 (en) Method for generating a key pair and transmitting a public key or request file of a certificate in security
CN109067524B (en) Public and private key pair generation method and system
CN106972931B (en) Method for transparentizing certificate in PKI
EP2951949B1 (en) Modified sm2 elliptic curve signature algorithm supporting message recovery
CN107948143B (en) Identity-based privacy protection integrity detection method and system in cloud storage
US8122245B2 (en) Anonymity revocation
WO2019228557A3 (en) System and method for decentralized-identifier authentication
CN108551392B (en) Blind signature generation method and system based on SM9 digital signature
CN112202558B (en) Credible digital signature method and device based on block chain
CN101931631B (en) Method for digital signatures capable of establishing reliable correspondence with handwritten signatures
CN101127107A (en) Electronic document automatic signing system and method
CN106713336B (en) Electronic data safeguard system and method based on double, asymmetrical encryption technology
CA2317775A1 (en) Hybrid signature scheme
CN107835082B (en) Traceable ring signature authentication protocol based on identity
CN102739626A (en) Method and device for time synchronization, time stamping device and trusted time server
CN104392185A (en) Method for verifying data integrity during log forensics in cloud environments
CN101917273A (en) ECC certificate-based ADS-B data authentication method
CA2669472C (en) Compressed ecdsa signatures
CN112152807A (en) Two-party collaborative digital signature method based on SM2 algorithm
CN111654366A (en) Secure bidirectional heterogeneous strong-designation verifier signature method between PKI and IBC
CN110943845A (en) Method and medium for cooperatively generating SM9 signature by two light-weight parties
CN104917615A (en) Trusted computing platform attribute verification method based on ring signature

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant